Security Week Briefing

Latest cybersecurity news headlines.

Views expressed in this cybersecurity and cybercrime update are those of the reporters and correspondents.

Accessed on 30 August 2022, 2111 UTC.

Content provided by email subscription to "Security Week Briefing."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGqQJmmlvxCmQDCvPpRdgCzLXWP

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)

SecurityWeek Briefing | Tuesday, August 30, 2022 [Beta]

CISO Forum - Request Access

Latest Cybersecurity News Headlines


picture-187 image

HowHow Technology Can Think Globally and Act Locally to Inform Global Cyber Policies

Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date. - Read the Column by Keith Ibarguen

Derek Manky

How Economic Changes and Crypto's Rise Are Fueling the use of "Cyber Mules"

Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date. - Read the Column by Derek Manky

John Maddison

Universal ZTNA is Fundamental to Your Zero Trust Strategy

Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs. - Read the Column by John Maddison

ICS/OT Security Conference

Applied ICS Security Training Lab

2022 ICS Cybersecurity Conference - October 24th - Atlanta


This full-day lab course gives participants hands-on experience attacking and hardening a simulated power plant network to learn about common ICS vulnerabilities and defenses. Participants will attack historians, HMIs, and PLCs to cause a power outage in the 3D simulation, and then implement defenses like firewalls and network monitoring to harden it.

Learn More
CISO Converstations

CISO Conversations: Zoom, Thycotic CISOs Discuss the CISO Career Path

The CISO is an organization’s top person in cybersecurity. Is that it? Is that the end of a CISO’s career progression?

Read More
Defend Against Ransomware Attacks

RSS Feed | Webcasts | Virtual Events

© 2022 Wired Business Media


Comments

Popular posts from this blog

The Cyberwire Daily Briefing

Cyber War News Today.

BleepingComputer.com